In a couple of prior posts, I explained the “gold copy” or “trusted build” concept, and the role of EAC, NIST, and test labs. I can’t seem to completely bury this tale, because it raised another question about the processing of checking a voting system to see if it is legit: “Why is this checking … Continued